Commutative Watermarking-Encryption of Multimedia Data Based on Histograms
暂无分享,去创建一个
[1] Jiwu Huang,et al. Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping , 2009, IWDW.
[2] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.
[3] Shiguo Lian,et al. Quasi-commutative watermarking and encryption for secure media content distribution , 2009, Multimedia Tools and Applications.
[4] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[5] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[6] Jianping Li,et al. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications , 2018, Multimedia Tools and Applications.
[7] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[8] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[9] Xinpeng Zhang,et al. Towards More Robust Commutative Watermarking-Encryption of Images , 2013, 2013 IEEE International Symposium on Multimedia.
[10] C. Lin,et al. Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing , 2006 .
[11] Xinpeng Zhang,et al. A New Approach to Commutative Watermarking-Encryption , 2012, Communications and Multimedia Security.
[12] Xinpeng Zhang,et al. Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy , 2015, ACIVS.
[13] Zhengquan Xu,et al. On the provably secure CEW based on orthogonal decomposition , 2014, Signal Process. Image Commun..
[14] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[15] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[16] Xinpeng Zhang,et al. Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms , 2014, Int. J. Multim. Data Eng. Manag..
[17] Roland Schmitz,et al. Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification , 2017, Adv. Multim..
[18] Jiwu Huang,et al. Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[19] M. Vijayaraj,et al. An optimal approach for watermarking using MRC4 encryption scheme , 2017, Cluster Computing.
[20] Rik Van de Walle,et al. End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation , 2013, IEEE Signal Process. Mag..
[21] Shiguo Lian,et al. Commutative watermarking and encryption for media data , 2006 .
[22] Hichem Sahbi,et al. Using entropy for image and video authentication watermarks , 2006, Electronic Imaging.